[1]
|
姜哲. 无人机巡线电力设备故障的视觉检测技术 [D]. 西安: 电子科技大学, 2017.
|
[2]
|
何道敬, 杜晓, 乔银荣, 等. 无人机信息安全研究综述 [J]. 计算机学报, 2019, 42(5): 1076-1094.
|
[3]
|
冯朝胜, 秦志光, 袁丁. 云数据安全存储技术 [J]. 计算机学报, 2015, 38(1): 150-163.
|
[4]
|
冯登国, 张敏, 张妍, 等. 云计算安全研究 [J]. 软件学报, 2011, 22(1): 71-83.
|
[5]
|
WAZID M, DAS A K, KUMAR N, et al. Secure three-factor user authentication scheme for renewable-energy-based smart grid environment [J]. IEEE Transactions on Industrial Informatics, 2017, 13(6): 3144-3153.
|
[6]
|
谭霜, 贾焰, 韩伟红. 云存储中的数据完整性证明研究及进展 [J]. 计算机学报, 2015, 38(1): 164-177.
|
[7]
|
XU J, WEI L, ZhANG Y, et al. Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures [J]. Journal of Network and Computer Applications, 2018, 107: 113-124.
|
[8]
|
PENG S, ZHOU F, LI J, et al. Efficient, dynamic and identity-based remote data integrity checking for multiple replicas [J]. Journal of Network and Computer Applications, 2019, 134: 72-88.
|
[9]
|
SEBÉ F, DOMINGO-FERRER J, MARTINEZ-BALLESTE A, et al. Efficient remote data possession checking in critical information infrastructures [J]. IEEE Transactions on Knowledge and Data Engineering, 2008, 20(8): 1034-1038.
|
[10]
|
WANG Q, WANG C, REN K, et al. Enabling public auditability and data dynamics for storage security in cloud computing [J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 22(5): 847-859.
|
[11]
|
张庆功, 赵现昌. SIFT算法在无人机遥感影像特征提取中的应用 [J]. 河南水利与南水北调, 2019, 48(11): 63-65.
|
[12]
|
郭会, 邓伦治. 一个基于双线性映射的无证书多接收者签密方案 [J]. 贵州师范大学学报(自然科学版), 2018, 36(6): 98-105.
|
[13]
|
许钟华, 张龙军. 基于MHT的云环境下数据完整性检验方案 [J]. 计算机与网络, 2014, 40(19): 63-66.
|
[14]
|
苏迪, 刘竹松. 一种新型的Merkle哈希树云数据完整性审计方案 [J]. 计算机工程与应用, 2018, 54(1): 70-76.
|
[15]
|
LI L M, YANG Y H, WU Z H. FMR-PDP: Flexible multiple replica provable data possession in cloud storage [C]//International Symposium on Computers and Communications. 2017: 1115-1121.
|
[16]
|
李晨. 云存储数据的安全审计技术研究 [D]. 西安: 电子科技大学, 2018.
|
[17]
|
秦志光, 王士雨, 赵洋, 等. 云存储服务的动态数据完整性审计方案[J]. 计算机研究与发展, 2015, 52(10): 2192-2199.
|
[18]
|
PAPAMANTHOU C, TAMASSIA R, TRIANDOPOULOS N. Optimal authenticated data structures with multilinear forms [C]//International Conference on Pairing Based Cryptography. Springer, 2010: 246-264.
|
[19]
|
HARIHARASITARAMAN S, BALAKANNAN S P. A dynamic data security mechanism based on position aware merkle tree for health rehabilitation services over cloud [J]. Journal of Ambient Intelligence and Humanized Computing, 2019(7): 1-15.
|
[20]
|
ERWAY C, PAPAMANTHOU A C, TAMASSIA R. Dynamic provable data possession [J]. ACM Transactions on Information and System Security, 2015, 7(4): 1-29.
|